Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

If you do not know the answer please leave it blank 1. Access control lists (ACL

ID: 3760708 • Letter: I

Question

If you do not know the answer please leave it blank

1.

Access control lists (ACLs)

A) prevent malware from infecting computers
B) prevent all traffic except what is desired
C) are rules configured by network administrators that firewalls use to determine what traffic is allowed
D) blocks viruses from getting into the network

2.

A firewall

A) always allows packets to flow inward
B) is all that is ever needed for a secure network
C) isolates an organization's internal network from the larger internet
D) never allows packets to flow outward unless they are requested from the outside network

3.

In modern network communication,

A) both symmetric and asymmetric cyptography are used together
B) the caesar cipher is used
C) only symmetric cryptography is used
D) only asymmetric cryptography is used

4.

A VPN (Virtual Private Network)

A) provides a secure tunnel between a website and a client browser between the application layer and transport layer
B) Uses protocols like IPSec to provide security at the network layer
C) uses WEP to secure the wireless channel
D) requires the user to set up a virtual circuit to the other endpoint

5.

A certificate authority (CA)

A) gives each pair of users wishing to communicate a private key they can use as a session key
B) keeps copies of the private keys of all entities (users)
C) binds a public key (certificate) to an entity (user)
D) publishes the private keys of all entities (users)

6.

SSL (Secure Sockets Layer)

A) secures the communication at the data-link layer
B) secures the wireless signal by adding security to the physical layer
C) requires the user to enter their special SSL password
D) provides a secure API between the application layer and transport layer

7.

Intrusion detection systems

A) take corrective action to prevent malware from infecting routers
B) operate on the TCP/IP headers only
C) conduct deep packet inspection to alert on potentially harmful traffic
D) often result in "false alerts" that require system administrators to investigate

8.

WEP (wired equivalency protocol)

A) is more secure than the AES standard
B) is better than WPA
C) uses a 56 bit key over a 64 bit packet, and encrypts 3 times
D) Is a flawed security protocol that was poorly designed

9.

We must assume that Trudy can do all of these except

A) attempt to impersonate either Bob or Alice
B) know Bob or Alice's private key
C) evesdrop or intercept messages between Bob and Alice
D) hijack or take over a connection between Bob and Alice

10.

A modern crypto system relies on

A) Trudy being dumb
B) a secret code that only the sender and receiver know
C) mathematical methods that are impossible to crack without long periods of time
D) Bob and Alice not sharing their passwords

Explanation / Answer


1. B) prevent all traffic except what is desired(it gives access to users only present in list)
2. C) isolates an organization's internal network from the larger internet(all the internet traffic basically flows through the firewall and based on organizations security policy content is blocked)
3.
4. D) requires the user to set up a virtual circuit to the other endpoint
5. A) gives each pair of users wishing to communicate a private key they can use as a session key
6. D) provides a secure API between the application layer and transport layer
7. C) conduct deep packet inspection to alert on potentially harmful traffic
8.
9.
10. C) mathematical methods that are impossible to crack without long periods of time

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote